ANDROID SECURITY - LEVEL 1

ADVANCED REVERSE ENGINEERING OF APPS

During this hands-on training course you will be supported by one of our experts, offering one-to-one coaching so that you can gain practical experience in learning advanced reverse engineering techniques and frameworks that can be used by powerful attackers to target mobile applications.

SECURE MY MOBILE ANDROID APP - LEVEL 1

This two day course is particularly developed for mobile application developers. With this training, hackers will no longer have an easy life with your codes. We cover four main topics, including understand your risk, security by obfuscation, security by architecture and security by yourself.

SECURE MY CODE AGAINST SIDE-CHANNEL ATTACKS

This course will provide you with side-channel attack knowledge and show how your implementation can withstand these attacks. During this training we will cover the theoretical aspects of attacks, as well as counter-measures with demonstrations.

ROWHAMMER TRAINING

During this one plus one day (second day optional)training course you will learn how to apply the Rowhammer how the Rowhammer effect can be used to corrupt and recover secrets from a TrustZone implementation. An optional second day covers the mobile ‘Drammer’ attack.

TRUSTZONE V7-A, V8-M & TRUSTY

During this training participants will learn how TrustZone (ARM Security Extensions) works on ARM Architecture v7-A and v8-M. They will learn in detail what composes a TrustZone v7-A secure kernel and how it interacts with the rest of the system. They will then focus on the real world secure kernel implementation “Trusty” open-sourced by Google. They will modify Trusty in order to implement a Trusted Applet which will communicate with non-secure Linux application.

WHITEBOX SECURITY INVESTIGATION

During this two day training course you will learn how attacks on whitebox cryptography can be realised, from the mobile application to the secret key. An extra day for statistical attacks (DPA, CPA) and fault injections (DFA) can be arranged.